MediaArchives



AVTOKYO2017

SPEAKER

TITLE

PRESENTATION

Kohki Ohhira (KOH) [ja]A Tale of Terror on Printers #1 -Utterly Simple Attack-
ENGLISH & JAPANESE
Tomohisa Ishikawa [ja]Latest Penetration Test in U.S. (What is Red Team Service?)  Avtokyo2014 Obsevation of VAWTRAK(ja)
pancake[en]Digging into radare2 for fun and profit
 
Masaki Kamizono,Yin Minn Pa Pa,Hiroshi Kumagai,Takahiro Kasama[ja]Be a decoy and drop it ! : A new approach to taking down exploit kits
 
Tomi Tuominen [en]All your encrypted computer are belong to us  ()
Ren Kimura(rkx1209)[ja]More efficient remote debugging with thin hypervisor
Peeling Onions
seraph [ja]STORY OF DOMAIN NAMES 
Yamatono[ja]Establishing CSIRT is difficult? Heh! It's the Komei trap!
 
Soohyun Jin, Kiyong Sim[en]What happened to your home?
 
Boik Su[en]The Amazing Toolman - Mastering the tools and propose a hackable ""Swiss Army Knife"" tool for the 21st century
 
Park Moonbeom a.k.a 朴文範[en]A Deep Dive into the Digital Weapons of the Enemy Country's Cyber Army
 
Hiroshi Kumagai, Masaki Kamizono, Yin Minn Pa Pa, Yu Tsuda[ja]Monitoring Attacker: His name is YOUSSEF 
 







AVTOKYO2015

SPEAKER

TITLE

PRESENTATION

Sh1n0g1 [ja]EVASION TECHNIQUES A TO Z N/A
op [ja]Malware in ATMs  
Tsukasa OI [ja]Beginners' Guide on Stagefright Exploitation  
Razor Huang [en]APT Malware: Attribute and Development
 
Masato Kinugawa [ja]Bug-hunter's Sorrow
[ja]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja)
[en]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en)
seraph [ja]Collecting information of targeted attacks by OSINT
 N/A
nishimu-lla-makko (nishimunea & @llamakko_cafe) [ja]THREAT OF DATA URL SCHEME - THEY ARE STILL HERE
 
ntddk [ja]Peeling Onions
Peeling Onions
ym405nm [ja] Gathering attacks against WordPress
 
inaz2 [ja]Abusing Interrupts for Reliable Windows Kernel Exploitation
[ja]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja)
[en]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en)



AVTOKYO2014

SPEAKER

TITLE

PRESENTATION

kyo_ago [ja]HTML5 ApplicationCache Poisoning of horror
(0-9.sakura.ne.jp)
inaz2 [ja]ROP Illmatic: Exploring Universal ROP on glibc x86-64
[ja]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja)
[en]
 ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en)
Security4all [en]The 100yen Cyber Analyst Toolkit

 
Masata NISHIDA [ja]Observation diary of VAWTRAK

Avtokyo2014 Obsevation of VAWTRAK(ja)

Mi [ja]'MOUSOU' tale - What will happen after Exploits or Security Incidents broke out?
 
N/A
hasemunea (nishimunea and HASEGAWA Yosuke) [ja]Future of Web security opened up by CSP

Future of Web Security Opened up by CSP


AVTOKYO2013.5

SPEAKER

TITLE

PRESENTATION

Hendrik ADRIAN [en]Wanna stop a botnet that distributing malware as service? Drag its botherder into the law..
AV Tokyo 2013.5 : マルウェア・ボットネットを止めたいなら...犯罪者を捜して警察に連れて行こう!
(YouTube)
Masaki Katayama [ja]Dynamic Analysis and Visualization Techniques of Malware N/A
Seunghyun Seo [ja]Smartphone game vulnerabilities and cheats, and countermeasures N/A
Masata Nishida
[ja]Detail of CVE-2013-4787(Master Key Vulnerability)

[ja]
AVTOKYO2013.5 CVE-2013-4787(Master Key Vulnerability)のソースコード的解説
[en]
AVTOKYO2013.5 Detail of CVE-2013-4787 (Master Key Vulnerability)
wakatono [ja]Malicious Connection Prevention by Faking DNS Response  
Michio Sonoda, Hideaki Ihara, @cci_forensics, Tkashi Matsumoto [ja]Panel Discussion - End of Malware Forensics -
N/A
AIDO&Manaka [ja]That's weird! Many security measures have few effect in Japan. --Light & Shadow-- 

ENGLISH 

JAPANESE
ma.la [ja]XSS on porn websites

(ma.la)
Anthony LAI,Zetta KE [en]China is a victim, too :-) (AVTokyo Special Edition)
[ja]
AVTOKYO2013.5 CVE-2013-4787(Master Key Vulnerability)のソースコード的解説
[en]
AVTOKYO2013.5 Detail of CVE-2013-4787 (Master Key Vulnerability)

Yuji Tounai [ja]I wanna be a bug bounty hunter
[ja]
AVTOKYO2013.5 CVE-2013-4787(Master Key Vulnerability)のソースコード的解説
[en]

Kanatoko [ja]Web Intrusion Detection with Bayesian Network
AVTOKYO2013.5 CVE-2013-4787(Master Key Vulnerability)のソースコード的解説
murachue [ja]a Data broadcasting that (may be) fun (provisional) N/A
Hiroaki Sakai,Yoshinori Takesako,Kneji Aiko,Kazuki Matsuda,Takeyasu Sakai [ja]wabi-sabi Assembler Tanka
Assembly Language Tanka - SAKAI Hiroaki(jp)
アセンブラ短歌 - 坂井弘亮

Assembly Language Tanka - SAKAI Hiroaki(en)
Assembly Language Tanka - SAKAI Hiroaki

Extreme Assembler Tanka - eagle0wlExtreme Assembler Tanka - eagle0wl

Assembler Tanka "Shooting Star" - Takeyasu Sakai
アセンブラ短歌「流れ星」 坂井丈泰

Assembler Haiku - TAKESAKO
Assembler Haiku - TAKESAKO

Assembly Tanka on Web - Aiko Kenji
Assembly Tanka on Web - Aiko Kenji



AVTOKYO2012

SPEAKER

TITLE

PRESENTATION

Shirou Maruyama/
Shuzo Kashihara/
Shingo Orihara/Hiroshi Asakura
[ja] Malware similarity analysis on binary using approximate string matching 

       ENGLISH    JAPANESE
(slideshare)
Daiki Fukumori [ja] Playing with sandbox ---AVTokyo style 

ENGLISH & JAPANESE
ma.la [ja] JavaScript Security from hell
(ma.la)
Anthony Bettini [en] Surprising behaviors in Japanese mobile apps
       ENGLISH     JAPANESE
Masata Nishida [ja] Android Malware Heuristics
       ENGLISH 
(slideshare)
     JAPANESE
(slideshare)
Beist [en] How south korea makes white-hat hackers
    ENGLISH
(grayhash.com)
  JAPANESE
@security4all [en] Social engineering is not dead, long live social engineering!! 

ENGLISH 

JAPANESE
Daniele Iamartino [en] Tower of Hanoi CTF team

ENGLISH 

JAPANESE
Marat [en] ILLUSTRATED GUIDE TO CREATING A CTF
ENGLISH & JAPANESE


AVTOKYO2010

SPEAKER

TITLE

PRESENTATION

Yosuke HASEGAWA Internet Explorer exSpoilt Milk codes
(utf-8.jp)(pptx)
TAKESAKO no-alnum x86 programming


@Security4all Security fails of 2010
-Those who cannot remember the past are condemned to repeat it-
ENGLISH & JAPANESE
ChakYi & Externalist Code Injection for Nintendo Wii
ENGLISH & JAPANESE(ppt)
Wakatono Fixed-point observation of "Drive by Download attacks"
ENGLISH & JAPANESE
AIDO & Manaka :P Countermeasure against Information Leakage
N/A
Toshio NAWA "Attack side Story" in Cyber Spacee
N/A




AVTOKYO2009

SPEAKER

TITLE

PRESENTATION

Project $ (TAKESAKO、HASEGAWA) Legend of Fastest CODE (Episode of Aomi Touring)
 
ENGLISH & JAPANESE
(pptx)(utf-8.jp)

Tsukasa Ooi /a4lg Lack of System Registers and two simple anti-forensic attacks
 
ENGLISH & JAPANESE
(a4lg.com)
Tsukasa Ooi /a4lg Creating Secure VM - Compararison between Intel and AMD, and one more thing...

Nguyen Anh Quynh Unified memory forensic toolset for Virtual Machine
 ENGLISH  JAPANESE
Yoshida ARP Cache Poisoning mecahnism and measures

N/A
IISEC Hideki Hatagami Social Engineering?


N/A
TANKYO Play with Google Maps: Mapping of Malware Source
 ENGLISH  JAPANESE
AIDO The Data Center "Hoi-Hoi" Trap

 ENGLISH  JAPANESE
Paul Sebastian Ziegler Well... it's Japan.
 
ENGLISH & JAPANESE
(observed.de)
mR-pBx Ask mR-pBx N/A




AVTOKYO2008

SPEAKER

TITLE

PRESENTATION

Kenji Aiko New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access

ENGLISH
 
JAPANESE
Yosuke Hasegawa Web application Security depending on Browser
ENGLISH & JAPANESE
(utf-8.jp)
Youki Kadobayashi, Ph.D. Eliminating Fear and Uncertainty in Malware Incident Response with Malware Experience Lab

N/A

Shuzo Kashihara Developing Obfuscator targets VC++ projects

ENGLISH
 
JAPANESE
Daiki Fukumori XSS worm intermediate the Flash
ENGLISH
TAKESAKO HTML Binary Hacks 2008 YATTA!
ENGLISH & JAPANESE
(wafful.org)